Copyright act Copyright protection is provided under the Copyright Act 1968 and gives exclusive rights to license others in regard to copying once work, performing it in public, broadcasting it, publishing it and making an adaptation of the work. Rights vary according to the nature of the work. Those for artistic works, for instance, are different from those for literary and musical works. Depending on the material, copyright for literary, dramatic, musical and artistic works generally lasts 70 years from the year of the author's death or from the year of first publication after the author's death.
Copyright for films and sound recordings lasts 70 years from their …show more content…
The Privacy Act contains 13 Australian Privacy Principles (APPs) which provide the rules for how agencies such as IP Australia must handle your personal information, including how you can request access to, and correction of, that personal information.
Work place safety legislation This administers and provides advice on the Work Health and Safety Act 2011 and the Work Health and Safety Regulation 2011.
This help to attain a healthier environment to attain outcomes which will be good for any organization to meet
Stakeholders.
Access and equity principles This also comes under work place safety. Access services are available to everyone who is entitled to them and should be free of any form of discrimination. Equity services should be developed and delivered on the basis of fair treatment of anyone eligible to receive them
Code of ethics A code of ethics is a set of statements about appropriate and expected behavior of members of a professional group and, as such, reflects its values. This work as boundaries for everyone to work under that and help to achieve maximum outcomes as per the law and conduct.
1.
Privacy Policy Checklist of …show more content…
Physical Protection, Administrative protection, Technical safeguard
We intend to protect your personal information and to maintain its accuracy. IBM implements reasonable physical, administrative and technical safeguards to help us protect your personal information from unauthorised access, use and disclosure. For example, we encrypt certain sensitive personal information such as credit card information when we transmit such information over the Internet. We also require that our suppliers protect such information from unauthorised access, use and